bburky / mathematica-ctf-writeupsLinks
Writeups from various CTFs solved with Mathematica
☆11Updated 8 years ago
Alternatives and similar repositories for mathematica-ctf-writeups
Users that are interested in mathematica-ctf-writeups are comparing it to the libraries listed below
Sorting:
- Hack In Paris 2018 Slideware☆18Updated 7 years ago
- ☆43Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago
- AxMan ActiveX Fuzzer: This is ancient, please don't use it =D☆28Updated 4 years ago
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- BlazeFox Exploit☆18Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- CVE-2018-4330 POC for iOS☆17Updated 7 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- Using SEH to bypass CFG☆29Updated 8 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 6 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Updated 11 years ago
- ☆22Updated 7 years ago
- Application Security library☆11Updated 12 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Updated 8 years ago
- Slides of 44Con 2018☆22Updated 7 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 6 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Updated 12 years ago
- A static Internet Explorer Fuzzer.☆50Updated 8 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆60Updated 6 years ago
- My conference presentations and publications☆26Updated 3 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- ☆16Updated 8 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 10 years ago